Skip to main content
Log in

An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function

  • Published:
Applied Intelligence Aims and scope Submit manuscript

Abstract

A Unique chaotic image encryption on the basis of Enhanced Thorp shuffle and Zig-zag Scan based Convolution (ETS-ZSC) is proposed in this paper. A one-dimensional chaotic map is utilized for both shuffling the plain image and producing the critical grid for the convolution activity. The substitution operation is performed in two ways: forward substitution and reverse substitution with zigzag scan. The original seed of the logistic map is created from the hyper chaotic system by matching with the plain image to overcome the differential attacks. The security analyzes are held for the proposed method to prove safe against the chosen plain text/known plain text attack. From the simulations results, it is observed that the proposed methodology is having enough high key sensitivity, key space, good randomness, and equal sharing of pixels in cipher image.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Li S, Chen G, Zheng X (2006) Chaos-based encryption for digital image and video. Multimed Encrypt Authen Tech Appl 129

  2. Jakimoski G, Kocarev L (2001) Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans Circ Syst I: Fund Theory Appl 48(2):163–169

    Article  MathSciNet  MATH  Google Scholar 

  3. Matthews R (1989) On the derivation of a “chaotic” encryption algorithm. Cryptologia 13 (1):29–42

    Article  MathSciNet  Google Scholar 

  4. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos 8(06):1259–1284

    Article  MathSciNet  MATH  Google Scholar 

  5. Shannon C E (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715

    Article  MathSciNet  MATH  Google Scholar 

  6. Lian S, Sun J, Wang Z (2005) A block cipher based on a suitable use of the chaotic standard map. Chaos Solitons Fractals 26(1):117–129

    Article  MATH  Google Scholar 

  7. Pak C, Huang L (2017) A new color image encryption using combination of the 1d chaotic map. Signal Process 138:129–137

    Article  Google Scholar 

  8. Parvaz R, Zarebnia M (2018) A combination chaotic system and application in color image encryption. Opt Laser Technol 101:30–41

    Article  Google Scholar 

  9. Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 90:238–246

    Article  Google Scholar 

  10. Yavuz E (2019) A novel chaotic image encryption algorithm based on content-sensitive dynamic function switching scheme. Opt Laser Technol 114:224–239

    Article  Google Scholar 

  11. Zahmoul R, Ejbali R, Zaied M (2017) Image encryption based on new beta chaotic maps. Opt Lasers Eng 96:39–49

    Article  Google Scholar 

  12. Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17–25

    Article  Google Scholar 

  13. Zhang W, Yu H, Zhao Y-I, Zhu Z-I (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Process 118:36–50

    Article  Google Scholar 

  14. Kandar S, Chaudhuri D, Bhattacharjee A, Dhara B C (2019) Image encryption using sequence generated by cyclic group. J Inf Secur Appl 44:117–129

    Google Scholar 

  15. Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403–419

    Article  Google Scholar 

  16. Brindha M, Gounden N A (2016) A chaos based image encryption and lossless compression algorithm using hash table and chinese remainder theorem. Appl Soft Comput 40:379–390

    Article  Google Scholar 

  17. Murugan B, Gounder A G N (2016) Image encryption scheme based on block-based confusion and multiple levels of diffusion. IET Comput Vis 10(6):593–602

    Article  Google Scholar 

  18. Luo Y, Tang S, Liu J, Cao L, Qiu S (2020) Image encryption scheme by combining the hyper-chaotic system with quantum coding. Opt Lasers Eng 124:105836

    Article  Google Scholar 

  19. Guo J-I, et al. (2000) A new chaotic key-based design for image encryption and decryption. In: 2000. Proceedings. ISCAS 2000 Geneva. The 2000 IEEE International Symposium on Circuits and Systems, vol 4. IEEE, pp 49–52

  20. Yavuz E, Yazıcı R, Kasapbaşı M C, Yamaç E (2016) A chaos-based image encryption algorithm with simple logical functions. Comput Electr Eng 54:471–483

    Article  Google Scholar 

  21. El Assad S, Farajallah M (2016) A new chaos-based image encryption system. Signal Process Image Commun 41:144–157

    Article  Google Scholar 

  22. Premkumar R, Anand S (2018) Secured and compound 3-d chaos image encryption using hybrid mutation and crossover operator. Multimed Tools Appl:1–17

  23. Chai X, Gan Z, Yang K, Chen Y, Liu X (2017) An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and dna sequence operations. Signal Process Image Commun 52:6–19

    Article  Google Scholar 

  24. Norouzi B, Mirzakuchaki S, Seyedzadeh S M, Mosavi M R (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed Tools Appl 71(3):1469–1497

    Article  Google Scholar 

  25. Asgari-Chenaghlu M, Balafar M-A, Feizi-Derakhshi M-R (2019) A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation. Signal Process 157:1–13

    Article  Google Scholar 

  26. Xian Y, Wang X (2020) Fractal sorting matrix and its application on chaotic image encryption. Inf Sci 547:1154–1169

    Article  MathSciNet  MATH  Google Scholar 

  27. Talhaoui M Z, Wang X, Midoun M A (2020) Fast image encryption algorithm with high security level using the bülban chaotic map. J Real-Time Image Proc:1–14

  28. Xiao S, Yu Z, Deng Y (2020) Design and analysis of a novel chaos-based image encryption algorithm via switch control mechanism. Security and Communication Networks 2020

  29. Hu G, Li B (2021) Coupling chaotic system based on unit transform and its applications in image encryption. Signal Process 178:107790

    Article  Google Scholar 

  30. Liu H, Wen F, Kadir A (2019) Construction of a new 2d chebyshev-sine map and its application to color image encryption. Multimed Tools Appl 78(12):15997–16010

    Article  Google Scholar 

  31. Lu Q, Zhu C, Deng X (2020) An efficient image encryption scheme based on the lss chaotic map and single s-box. IEEE Access 8:25664–25678

    Article  Google Scholar 

  32. Tang Z, Yang Y, Xu S, Yu C, Zhang X (2019) Image encryption with double spiral scans and chaotic maps. Secur Commun Netw 2019

  33. Musanna F, Dangwal D, Kumar S, Malik V (2020) A chaos-based image encryption algorithm based on multiresolution singular value decomposition and a symmetric attractor. Imaging Sci J 68(1):24–40

    Article  Google Scholar 

  34. Xie E Y, Li C, Yu S, Lü J (2017) On the cryptanalysis of fridrich’s chaotic image encryption scheme. Signal Processxs 132:150–154

    Article  Google Scholar 

  35. Jolfaei A, Wu X-W, Muthukkumarasamy V (2016) On the security of permutation-only image encryption schemes. IEEE Trans Inf Forensic Secur 11(2):235–246

    Article  Google Scholar 

  36. Baptista MS (1998) Cryptography with chaos. Phys Lett A 240(1-2):50–54

    Article  MathSciNet  MATH  Google Scholar 

  37. Chen J-X, Zhu Z-I, Zhang L-B, Fu C, Yu H (2014) An efficient diffusion scheme for chaos-based digital image encryption. Math Probl Eng 2014

  38. Ye G, Huang X (2016) An image encryption algorithm based on autoblocking and electrocardiography. IEEE MultiMedia 23(2):64–71

    Article  Google Scholar 

  39. Enayatifar R, Abdullah A H, Isnin I F, Altameem A, Lee M (2017) Image encryption using a synchronous permutation-diffusion technique. Opt Lasers Eng 90:146–154

    Article  Google Scholar 

  40. Wang X-Y, Zhang Y-Q, Bao X-M (2015) A novel chaotic image encryption scheme using dna sequence operations. Opt Lasers Eng 73:53–61

    Article  Google Scholar 

  41. Wang X, Lintao Liu Y Z (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18

    Article  Google Scholar 

  42. Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340–358

    Article  MATH  Google Scholar 

  43. Wang X, Gao S (2020) Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a boolean network. Inf Sci 539:195–214

    Article  MathSciNet  MATH  Google Scholar 

  44. Wang X, Gao S (2020) Image encryption algorithm for synchronously updating boolean networks based on matrix semi-tensor product theory. Inf Sci 507:16–36

    Article  MathSciNet  MATH  Google Scholar 

  45. Li Q, Wang X, Wang X, Ma B, Wang C, Shi Y (2021) An encrypted coverless information hiding method based on generative models. Inf Sci 553:19–30

    Article  MathSciNet  Google Scholar 

  46. Hua Z, Zhu Z, Yi S, Zhang Z, Huang H (2021) Cross-plane colour image encryption using a two-dimensional logistic tent modular map. Inf Sci 546:1063–1083

    Article  MathSciNet  Google Scholar 

  47. Hua Z, Zhang Y, Zhou Y (2020) Two-dimensional modular chaotification system for improving chaos complexity. IEEE Trans Signal Process 68:1937–1949

    Article  MathSciNet  Google Scholar 

  48. Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320–3327

    Article  MathSciNet  MATH  Google Scholar 

  49. Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16-17):3895–3903

    Article  Google Scholar 

  50. Liu H, Wang X, et al. (2012) Image encryption using dna complementary rule and chaotic maps. Appl Soft Comput 12(5):1457–1466

    Article  Google Scholar 

  51. Wang X-Y, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62(3):615–621

    Article  MathSciNet  MATH  Google Scholar 

  52. Morris B, Rogaway P, Stegers T (2009) How to encipher messages on a small domain. In: Advances in Cryptology-CRYPTO 2009. Springer, pp 286–302

  53. Dalhoum A, Latif A, Mahafzah B A, Awwad A A, Aldhamari I, Ortega A, Alfonseca M (2012) Digital image scrambling using 2d cellular automata. IEEE Multimedia

  54. Wu Y, Noonan J P, Agaian S, et al. (2011) Npcr and uaci randomness tests for image encryption. Cyber J Multidiscip J Sci Technol J Sel Areas Telecommun (JSAT) 1(2):31– 38

    Google Scholar 

  55. Kahan W (1996) Ieee standard 754 for binary floating-point arithmetic. Lect Notes Status IEEE 754(94720-1776):11

    Google Scholar 

  56. Zhang Y-Q, Wang X-Y (2015) A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput 26:10–20

    Article  Google Scholar 

  57. Gan Z, Chai X, Yuan K, Lu Y (2018) A novel image encryption algorithm based on lft based s-boxes and chaos. Multimed Tools Appl 77(7):8759–8783

    Article  Google Scholar 

  58. Zhang Y-Q, Wang X-Y (2014) A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Inf Sci 273:329–351

    Article  Google Scholar 

  59. Chai X, Yang K, Gan Z (2017) A new chaos-based image encryption algorithm with dynamic key selection mechanisms. Multimed Tools Appl 76(7):9907–9927

    Article  Google Scholar 

  60. Rukhin A, Soto J, Nechvatal J, Smid M, Barker E (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications, Technical Report. Booz-Allen and Hamilton Inc Mclean Va

  61. Katz J, Menezes A J, Van Oorschot P C, Vanstone S A (1996) Handbook of applied cryptography. CRC press

  62. Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101–1108

    Article  MathSciNet  Google Scholar 

  63. Chen L, Ma B, Zhao X, Wang S (2017) Differential cryptanalysis of a novel image encryption algorithm based on chaos and line map. Nonlinear Dyn 87(3):1797–1807

    Article  MATH  Google Scholar 

  64. Chen L, Wang S (2015) Differential cryptanalysis of a medical image cryptosystem with multiple rounds. Comput Biol Med 65:69–75

    Article  Google Scholar 

  65. Preishuber M, Hütter T, Katzenbeisser S, Uhl A (2018) Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans Inf Forensic Secur 13(9):2137–2150

    Article  Google Scholar 

  66. Wang X, Liu C, Xu D, Liu C (2016) Image encryption scheme using chaos and simulated annealing algorithm. Nonlinear Dyn 84(3):1417–1429

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Brindha.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, C.M., Vidhya, R. & Brindha, M. An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function. Appl Intell 52, 2556–2585 (2022). https://doi.org/10.1007/s10489-021-02508-x

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10489-021-02508-x

Keywords

Navigation